About this Show

The Communicators

News/Business. People who shape the digital future.

NETWORK

DURATION
00:30:00

RATING

SCANNED IN
San Francisco, CA, USA

SOURCE
Comcast Cable

TUNER
Channel 100 (651 MHz)

VIDEO CODEC
mpeg2video

AUDIO CODEC
ac3

PIXEL WIDTH
704

PIXEL HEIGHT
480

TOPIC FREQUENCY

Jacqueline Beauchere 7, Jacqueline 3, Sony 2, Us 2, Washington 1, Textbook 1, Bing 1, Google 1, Verisign 1, Wii 1, At&t 1, Espilon 1, Maryland 1, Imageu 1, Gary Sinise 1, Steve Ballmer 1, Paul 1, U.s. 1, San Antonio 1, San Diego 1,
Borrow a DVD
of this show
  CSPAN    The Communicators    News/Business. People who  
   shape the digital future.  

    July 2, 2011
    6:30 - 7:00pm EDT  

6:30pm
proposals. many of us in the conservative wing are going to present our own proposal next week. that is to raise the debt ceiling. we will vote in favor of raising the debt ceiling next week, if we can, but it will be contingent on passing a balanced budget amendment to the constitution. >> watch the entire interview with senator paul on "newsmakers," sunday. it is also available online at c-span.org. >> this week on the button " communicators," jacqueline beauchere talks about microsoft'. >> jacqueline beauchere, what is your job at microsoft? >> trustworthy computing is an
6:31pm
initiative started at microsoft almost 10 years ago. it came at a time when bill gates sent an e-mail to the entire company and he basically was going to revamp the way that we look at computing. he wanted to make it as trustworthy, as reliable, as dependable as some other essential services we are familiar with. he picked up the phone, get a dial tone. you flip the light switch, the light comes on. he wanted computing to be that kind of a dependable, reliable, response of experience. we're looking at security, privacy, and reliability. all of that provides a safe trip, more trusted experience for the consumer, the end user when they go online. >> what do you specifically do? >> i run a group of folks who
6:32pm
specialize in online safety. we do a lot of outreach and online safety communications work. it takes a little bit of security and a little bit of privacy. online safety is taking care of the computer and the device and the maintenance of that device, and also to combat the social engineering type of attacks that come to the person. we provide consumers with resources and materials about helping to protect themselves on-line. >> what is your number one priority right now? >> we have a host of things we are addressing. we are particularly interested in online reputation and helping people safeguard that.
6:33pm
6:34pm
6:35pm
6:36pm
there seems to be this call to action on capitol hill. let's get your perspective. >> that deficit is interesting. i think that might continue for the better part of a generation, the better part of about 20 years. the digital natives, we have to wait until they become the teachers and educators. that will be a different story. the digital immigrants are there now. that is why it is so difficult for teachers and adults and parents to get their arms around some of these issues. in terms of what congress can do, there are a number of things. you mentioned research. commissioning research, studies, helping fund these activities so we really get a clearer picture of the landscape and really know what is out there. that is key. but there is a lot of private
6:37pm
sector research, but other research, but we're not always comparing the same thing. there is a lot of cyber bully research, but not a lot of people are familiar with that term. they may say, i get pushed around online or people try to harass me or i get pushed, we want to talk the same language. there is a research component. also, this is a k-12 study. it would be key for some integrated online safety, education in the classroom. i know how hard it is. i know there are many friends who are teachers. that has to be worked into the daily school day. but if some of those lessons were supplemented or complement it with some cyber security, cyber ethics, cyber safety education and lessons, that would be a great start.
6:38pm
supporting that education in schools is important. i>> jacqueline, tony brought up congress's role. it does microsoft has a responsibility to ensure cyber safety? >> absolutely. not only did they have a responsibility, a shared responsibility, a whole host of factors. we have the industry and microsoft and the terrible, not only to create the technology to provide those tools and resources and materials to help educate people about how to use the products and best protect themselves on-line. consumers also have responsibility. consumers have to do their updates. have to make sure when we talked about the maintenance of the device, they have certain actions they need to take. and educators have irresponsibility. no one person or entity or organization to tackle these
6:39pm
issues themselves. promptboo>> we have these debatr specific privacy proposals. what are some of the specific steps congress should take with respect to companies? give me some information about the safety issue. >> microsoft has been in favor of the legislation since 2005. that is something we are behind. we are also behind industry regulation, particularly with regulation and innovation. we want that to thrive because that will be put together for children working in this 21st century. we want them to have the right tools and resources to excel.
6:40pm
we are teaching kids today about jobs that don't even exist. and it is based on technology that is not even invented yet. that is the role of education. >> jacqueline, you mentioned industry self regulation. when it comes to microsoft, a lot of talk about the collection of information, personal information online, how to safeguard that. how does microsoft safeguard that? >> we have our own policies and procedures for acting as a data handler. we also encourage consumers to take their role in doing that. we make sure that we encourage people to be careful about what they share online. you're on my reputation is being created out there, and you don't even know it sometimes. it woulthese profiles and imageu
6:41pm
are being formed even sometimes without your knowledge. it is the responsibility for the consumer to be careful what he or she post's on-line, what he or she shares online. that reputation is being formed now. kids engaged in somewhat questionable activities, whether it is posting a photos are videos or even just texts. once it is on-line, is there to satay. i heard somebody say what happens on facebook and google stays there forever. it is important because it was posted online, what is shared. that reputation is being formed. >> along that line, have you attempted to simplify some of the user agreements of people understand what they're signing up for? >> with the privacy notices, we
6:42pm
have layered notices. we get a high level view of the privacy notice, and it goes from there. that is really important and something that should be watched. >> things can go wrong. we saw that with sony and espilon, hackers command install information. microsoft was not implicated any of that, the question arises, what is microsoft's thought on data breach? does their need to be a federal data breach standard? what other protections would you like to see congress deliver? >> microsoft focuses on notice and transparency. those are the in depth policies and practices and standards and procedures we followed as a data handler.
6:43pm
when we talk about comprehensive privacy legislation, as we have been for several years, and has to encompass all of these things, both on my reputation and online activities and offline activities. not to make any real distinction between what is going on of real-world or the online world. >> does their need be a federal standard? i know 40 states have their own standards, a data breach notification. should the federal government had something along those lines? >> it is difficult for any entity to do business with 50 different standards, potentially, but that is something for the businesses and legislators to decide. why >> artest from microsoft is jacqueline beauchere, focusing
6:44pm
on online safety and privacy. tony is our guest reporter. jacqueline, with the move into tablets and the ability of wireless, is that increased the security breaches that happen? >> a meeting exposing people more? >> yes. >> is the other side of the same coin. the same basic advice that would give consumers is probably equally applicable on the go at home or at work. just simple things to keep in mind. being careful with a share on mine, not sharing personal information, making sure the device itself is firmly defended in terms of beefing up a local computer's defenses.
6:45pm
you have to take care of the health and maintenance of the device as well, not sharing personal information and so forth. >> millions of people bank online today. that is as personal as a cadet. >> just make sure that you have special accounts and passwords, everything is protected as opposed to just leaving passwords out where they could be seen or consume or spot by someone else. >> where does cloud competing fit into this? >> it has been around for a long time. when you think about microsoft, that has been around 15-plus years. that is caught competing for the consumer. microsoft definitely has a good foothold in that area. >> what kind of security d you have?
6:46pm
>> in terms of? >> protection for the consumer and their information. >> we cannot discuss that. >> we cannot mention tablets without talking about apps. they're the reason that people buy those. what we saw a lot of this week and last week were companies talking about how they're doing a lot in the space of privacy and security, but the applications and not doing as much. the first question, can you talk about how microsoft to purchase some of these? >> that is not my area of expertise. >> i guess the larger question would be, what is the line? how does a company like microsoft deal with those makers better dealing with different
6:47pm
circumstances? you go out with these long privacy policies, but some of these applications do not. >> we have this large information system that we deal with. we help grow. one of the things we have done all the security side is the security development life cycle. i have friends at microsoft who went to university, and when they're learning about security, it was not too long ago that security was an afterthought. the software would be developed and the product would come to fruition and in chapter 37 of the textbook mentioned something about security. and try to retrofit security back into it. that is not the way microsoft does it. microsoft has anything that connects to the internet, and has to go through the security
6:48pm
development like cycle. security is built-in from the beginning. anything with privacy that could go along with thinking about it at the early stages of the software development. instead of security being in chapter 37 of the textbook, it is up front. that is something that we would want to share. >> jacqueline, with the advent of electronic healthcare records and electronic interaction, what is microsoft doing to ensure the privacy of those very personal records? >> we have a division of the company that focuses on health care, help solutions group, and it is the same as any other data handling practice. they have to be given the utmost care and the utmost attention. this is about as personal as personal information gets. we have all of those standards
6:49pm
and policies and practices in place. >> how widespread is cyber bullying? >>. widespread. -- pretty widespread. obviously, the biggest problem is some of the press coverage we have seen, which is actually children and young people taking their own lives because they have been bullied. >> could you see further federal legislation dealing with cyber bullying? >> we have a collection of laws at the state level, and that seems to be working fairly well. i think it is more of an education and awareness perspective, as opposed to legislating against it. >> jacqueline beauchere spent four years and the legal department of microsoft before moving over to the trust for the
6:50pm
computer group. tony? >> on the topic of kids, there are a plethora of laws for children. without digging into the specifics of these very complex laws, are there any other elements that we need to address with respect to children's privacy? >> i would also focus on what lawmakers to do in terms of existing laws, in terms of child exploitation generally. microsoft works with the national center for missing and exploited children, law enforcement agencies to take a hard look at child pornography and make sure we're doing everything we can to stop that. what we do in the international side is make sure all other countries are on board with our same stance. it is important that we not only have those possession laws and
6:51pm
dissemination laws, but possession as well. there are plenty of countries that exist where it is not a law to possess a child pornography. >> how can federal agencies address this? have you noticed the federal government has taken on more of an interest, active role in these instances? >> yes, last month we saw president obama told a conference in washington at the white house on cyber bullying. it was a key topic. wii at marks software at the table. that will continue. it will continue at dialogue and see what we have done on that front. i hope that effort, this prevention effort will benefit from another effort we have seen. you mentioned the national cyber security alliance. i am microsoft representative to that board.
6:52pm
it is a nonprofit that works closely with the department of homeland security. last october, we launched what we are calling it a message on convention. it was many from industry, business, government agencies coming together around one holistic message around cyber security, the cyber ethics. that message is stop, think, connect. i hope you have heard of it. if not, we're doing more in the months to come. basically, it is a virtual who's who around the table participating, and it is that one message that will galvanize people and bring people together so we do not halt all of these different messages. people talk about their pet project or initiative. instead, we're coming together, one voice. it is microsoft, verizon, at&t, verisign, all of these folks.
6:53pm
that is something that the cyber bullying african model itself after, one message around this important issue -- that is something that the cyber bullying effort can model itself after. >> jacqueline beauchere, i want to read something from steve ballmer. as a big company, we have a responsibility not just to socially respect the user but to build the technology that will protect the anonymity, privacy, the security of what i said, who i say it to, where i go, what is important to me. given the recent hearing on phone tracking, given the fact that if you look at it website and targeted advertising pops up a matter where you go, there is a lot of concern out there about being tracked. does microsoft have the technology and do you aggregate
6:54pm
the information that you collect from people? or can you identify individuals? >> on the phone, for instance, there has to be an express action by the consumer to say that you want to make your location known. so, no, that is not known or aggregated. every application, every encounter, you can either turn it off completely or every action, every encounter you have to expressly say, yes, you want the information to be known. a lot of people want the services. those who are aware of the service is really like them. you can stand on a street corner and a movie theater is there and you want to know what time the movie theater, the movie that you want to see is. were you might be near the store and you might want a coupon to get 25% of the purchase. there are very economical
6:55pm
reasons to have these features. people do like them. but other people, it is a very polarizing. >> just to follow up on the question about sony, as a breach like that keep you awake at night? >> it is always a risk. it can happen to anyone. that is what we have seen. but we do take significant precautions, investing in people on the ground in all of our business groups who specializes in privacy, specialize in security, he specialized in safety issues and help safeguard against it. >> as you have said, what happens on google or facebook stays there. one of the ideas that we heard earlier this week is the idea of an eraser, that there be a technology available to parents that the information about their child that is publicly available would not be available
6:56pm
anymore. as someone who kind of understands what is going on, who focuses on this for a living, is this a possible thing we could have? >> this notion of digital forgetting is something that is very new, on the cutting edge, and there is a lot of focus and attention paid to it. it is something we're going to watch. we will hopefully be playing a significant role there as well. >> what about "do not track" legislation? >> microsoft made its announcements several years ago, and we're doing what we can at the technology level and is working fairly well for us. >> have you gotten any metrics on the tracking? do you have any idea who is adopting? >> not that i am aware of. >> further on the idea, if congress were to broach the
6:57pm
issue, as a company that does offer some "do not track" technology, if congress were to implement that come any thoughts on what it would come? >> we will have to see. there are several bills and we will have to see where that falls. >> finally, jacqueline beauchere, with bing, are those searches saved? do people have confidence those searches go away? >> we are not going to be serving advertising in those searches -- excuse me, particularly in the email sector. when you are sending an e-mail, we are not serving up ads based on what is in that e-mail or a context like that. >> what brings you to d.c.? >> among other things, the issues to microsoft, there is a conference going on about cyber security, a strategy summit. >> do you work with dhs?
6:58pm
>> yes, they were at the meeting, try to come up with a plan for what a cyber security city would look like. our efforts in san diego and san antonio, and this is at the state level for maryland. >> what does that mean, cyber secure city? >> that is exactly the question that was posed yesterday. how equipped and prepared does the citizenry have to be? our government services readily available? the citizens not fall susceptible to worms and viruses and other issues? that is what they're trying to design. >> people want to know more about what microsoft does with regard to security, microsoft.com/security? >> that is a great place to start. >> jacqueline beauchere, focusing with online security
6:59pm
and safety for microsoft. tony, thank you for being here also. >> sunday on "newsmakers," senator rand paul talks about the debate over raising the debt ceiling, spending issues, and entitlement programs. that is at 10:00 a.m. and 6:00 p.m. eastern on c-span. this week, actor gary sinise announced the creation of a foundation helping soldiers, veterans, first responders, and their families. he also talks about his award winning documentary. it looks at his band that travels around the world performing for the u.s. military. this is one hour. [captions copyright national cable satellite corp. 2011] [captioning performed by national captioning institute]